News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Secure and seamless remote access 
B2B Cyber ​​Security ShortNews

With the latest version of its proven Connection Manager, Delinea, the specialist in Privileged Access Management (PAM) solutions for seamless security, has sustainably optimized the administration and protection of remote connections. Customers now benefit from more flexibility and a reduction in friction losses, which can also reduce threats such as ransomware. This is all the more important since, according to the Verizon 2022 Data Breach Investigations Report, compromised credentials are the attack vector of choice for cybercriminals and are also a major cause of ransomware attacks. These have increased by 13 percent in the past year and now make up 25 percent of the…

Read more

Tight budgets slow down IT security strategy
Tight budgets slow down IT decision-makers

Report: Tight budgets and a lack of executive support are causing critical security controls to fall by the wayside. 60 percent of IT decision-makers are being prevented from implementing an adequate IT security strategy More than half of IT security decision-makers (60%) are of the opinion that their IT security strategy is not keeping pace with the current threat situation Survey* by Delinea, the specialist in privileged access management (PAM) solutions for seamless security, shows. For example, 20 percent of the security professionals surveyed think they are lagging behind in their security practices, 13 percent believe they are standing still, and only 27 percent are trying…

Read more

Survey: Cloud security worries security professionals
Survey: Cloud security worries security professionals

Cloud security is currently the top concern for cybersecurity professionals, according to a survey by Delinea, a leading provider of privileged access management (PAM) solutions for seamless security. At this year's RSA Conference in San Francisco, more than 100 security professionals were interviewed about their current biggest problems and their cyber hygiene practices. For 37 percent of those surveyed, securing the cloud (cloud security) is the main cause for concern, followed by ransomware (19 percent) and a distributed workforce (17 percent). Poll at RSA Conference “Protecting Digital Assets in the Cloud Becomes the Number…

Read more

Protecting Servers from Cyber ​​Attacks: Free Best Practices E-Book
Protecting Servers from Cyber ​​Attacks: Free Best Practices E-Book Server Access Security

Delinea publishes free e-book “Conversational Server Access Security” with valuable best practices for “protecting servers from cyber attacks”. Delinea, a leading provider of Privileged Access Management (PAM) solutions for seamless security, is releasing “Conversational Server Access Security”, a new free e-book that offers companies valuable best practices for securing hybrid infrastructures. The guide, published in cooperation with Conversational Geek, shows how to successfully implement a Zero Trust approach to sustainably reduce cyber risks. Servers are always targeted Servers are the heart of the IT infrastructure and are often targeted by cybercriminals…

Read more

Delinea Secret Server with improved disaster recovery
Delinea Secret Server with improved disaster recovery

With the latest version of its proven Secret Server, Delinea, a leading provider of Privileged Access Management (PAM) solutions for seamless security, now offers improved disaster recovery and also sets new standards in terms of remote access. In addition to new design updates based on customer feedback, IT and security teams benefit from new security controls for greater reliability and a remote access service, a VPN-less session management feature that greatly simplifies the integrated management of privileged accounts. Credentials are the weak link As the 2022 CrowdStrike Global Threat Report showed, 80 percent of all cyberattacks involve credentials…

Read more

Future-proof cyber security lies in automation
Future-proof cyber security lies in automation

Maintaining one's own cyber resilience has become a mammoth task for security managers in recent years. Because the IT attack surface of companies has recently increased significantly thanks to increasing ransomware attacks, an increasingly distributed workforce and the ongoing migration to hybrid or multi-cloud environments. If companies want to go beyond pure survival mode and implement a future-proof cybersecurity strategy, they must subject their IT security to a reality check and increasingly rely on automation. Companies overestimate their defenses Cyber ​​attacks and their consequences are now considered the number one risk for companies. And those responsible for security in companies are aware of this...

Read more

Study: Cloud automation as a key to cybersecurity
Study: Cloud automation as a key to cybersecurity

Despite the tense security situation, companies overestimate the effectiveness of their security measures. A study shows that cloud automation can be the key to future-proof cybersecurity. The majority of IT decision-makers see cloud automation as an important key to future-proof cyber security, especially in combination with autonomous privileges and access. This is the result of a recent survey by Delinea, a leading provider of privileged access management (PAM) solutions. 86 percent of those surveyed are currently looking for ways to automate access controls, especially for privileged access. At the same time, companies are also increasing their resources to meet the growing threat landscape….

Read more